Please see this post for a full explanation of what this is about.
Various third party applications are expected to make references to locations in the “zero page”, usually because the programmer has not checked a pointer for validity before using it. In the near future, versions of RISC OS will treat this as an error, and the application will fail. Nightly builds of RISC OS since 2015-07-05 behave like this. A compatibility/logging module called ZeroPain is available that logs such illegal accesses and allows the buggy application to run. The log permits the problems to be identified so that application writers can fix the bugs.
Applications are listed below in alphabetical order along with current status. Please add more information and update existing information.
Version 1.51 is available for test from here
Version 1.51 appears free of directly caused "Zero pain’’ errors but does cause such an error within Menu module 0.38. A modification to the Menu module source has been suggested which does prevent the error.